论文标题
分布式系统的攻击弹性PUF的身份验证机制
An Attack Resilient PUF-based Authentication Mechanism for Distributed Systems
论文作者
论文摘要
在大多数基于PUF的身份验证方案中,通常都会参与中央服务器以验证设备PUF的响应以挑战位流。但是,在实践中,服务器的可用性可能是间歇性的。为了解决此类问题,本文提出了一项新协议,用于支持分布式身份验证,同时避免了漏洞泄漏的漏洞,可以从黑客式设备中检索CRP并集体用于建模PUF。主要思想是要以取决于验证者的方式来争先恐后地挑战挑战。每个设备的每个身份验证圈和跨设备独立的每个身份验证范围都不同。从本质上讲,争夺函数变为节点和数据包特异性,并且一个设备的两个验证器对同一挑战的响应可能会有所不同。因此,扰乱的功能都不能被恢复,即使是通过一组犯罪节点也可以建模PUF。使用基于FPGA的实施数据的数据验证结果证明了我们方法在挫败辅助参与者的PUF建模攻击方面的有效性。我们还讨论了反对模仿,SYBIL和逆向工程攻击的方法的弹性。
In most PUF-based authentication schemes, a central server is usually engaged to verify the response of the device's PUF to challenge bit-streams. However, the server availability may be intermittent in practice. To tackle such an issue, this paper proposes a new protocol for supporting distributed authentication while avoiding vulnerability to information leakage where CRPs could be retrieved from hacked devices and collectively used to model the PUF. The main idea is to provision for scrambling the challenge bit-stream in a way that is dependent on the verifier. The scrambling pattern varies per authentication round for each device and independently across devices. In essence, the scrambling function becomes node- and packet-specific and the response received by two verifiers of one device for the same challenge bit-stream could vary. Thus, neither the scrambling function can be reverted, nor the PUF can be modeled even by a collusive set of malicious nodes. The validation results using data of an FPGA-based implementation demonstrate the effectiveness of our approach in thwarting PUF modeling attacks by collusive actors. We also discuss the approach resiliency against impersonation, Sybil, and reverse engineering attacks.